Most businesses employ content filtering within the corporate network to block access to unapproved content such as adult sites and personal email accounts. Employees expect to be restricted when working on corporate desktops and laptops
With the proliferation of high-speed data connections and the ever-increasing reliance on devices, it’s no surprise that data usage is increasing. While the new age of mobility can be an incredible productivity driver – allowing
The mobile threat landscape is an interesting topic, partly because it’s so controversial. Talking to different people within the field can bring up wildly differing opinions over the severity of the situation. Fear-mongers will tell
Earlier this year at our Level conference, Jamie Woodruff, the ethical hacker who has hacked everything from Facebook to Kim Kardashian, gave us an insight into the methods social engineers use to access to our personal
Social engineering, ‘The art of manipulation for information’. With cyber attacks making headlines, the security industry is always innovating to help companies implement more sophisticated software to hit back at the attackers and protect sensitive
Machine Learning is the new buzzword. But what does it actually mean and is it important? Miranda Mowbray has worked in Machine Learning and cybersecurity for many years. At our conference LEVEL, she explained what
The world has changed. Of course, we all know the world has changed, we can see it. But are we aware of how much it has changed in such a short space of time? Graham
It’s finally here: exorbitant EU roaming data charges were switched off from Thursday 15th June allowing anyone travelling in the EU the ability to share, like, view and watch mobile content until their heart’s content.